87,399 Hits in 5.0 sec

The Design and Implementation of Intrusion Detection System based on Data Mining Technology

Qinglei Zhou, Yilin Zhao
2013 Research Journal of Applied Sciences Engineering and Technology  
This study introduces the types of traditional intrusion detection and data mining technology; Aiming at the defects and limitations of current intrusion detection system, the study has fused the data  ...  mining technology into intrusion detection model, and has designed and implemented the intrusion detection system based on data mining technology with the preliminary research and exploration.  ...  ACKNOWLEDGMENT The authors wish to thank the helpful comments and suggestions from my teachers and colleagues in intelligent detection and control lab at Zhengzhou.  ... 
doi:10.19026/rjaset.5.4531 fatcat:bgdewxi3yjgx5ma7ul7czwhfrm

Research on Intrusion Detection Based on User Portrait Technology

Zhenduo Wang, W.D. Deng
2022 MATEC Web of Conferences  
Under the big data scene, the intrusion detection technology has some problems, such as weak data processing ability, difficulty of precise location and so on.  ...  The intrusion detection technology based on user portrait technology, on the basis of fully mining the practical value of big data technology, refines the detection granularity, improves the intelligent  ...  The user behavior in intrusion detection system is mainly in the form of data. According to the source of data, intrusion detection system can be divided into host-based and network-based two.  ... 
doi:10.1051/matecconf/202235901013 fatcat:w6zlnp3tx5erfbd6tv5icvvtse

Intrusion Detection Method Based on Deep Learning

Chongrui Tian, Fengbin Zhang, Zhaoxiang Li, Ruidong Wang, Xunhua Huang, Liang Xi, Yi Zhang, Kuruva Lakshmanna
2022 Wireless Communications and Mobile Computing  
This paper builds an intelligent deep learning model and analysis model for intrusion detection data based on TensorFlow.  ...  with self-learning ability, and solve the rapid identification of unknown intrusion behaviors.  ...  The service data of this experiment was exported from the database system through the program, and the data was preprocessed before entering the intrusion detection big data security control model experiment  ... 
doi:10.1155/2022/1338392 fatcat:nidbwn7g7vglxcyvlxv4ncutqm

Application of Data Mining Technology in Software Intrusion Detection and Information Processing

Xuemin Zhao, Balakrishnan Nagaraj
2022 Wireless Communications and Mobile Computing  
Apply data mining technology to software intrusion detection; first, analyze and research software intrusion detection technology and data mining technology, including the basic concepts of software intrusion  ...  In order to improve the efficiency of the software intrusion detection system, the author proposes an application based on data mining technology in software intrusion detection and information processing  ...  Software intrusion detection refers to the process of identifying intrusions through various means; specifically, it refers to the collection of various user activity behavior data inside and outside the  ... 
doi:10.1155/2022/3829160 fatcat:wsqzmqswjrajjgu25yhq5q7ojm

Computer Network Intrusion Detection and Countermeasures

Liguo Xu, Jingyuan Chi
2017 DEStech Transactions on Social Science Education and Human Science  
Computer database intrusion detection technology refers to the use of computer network resources in the daily use may be used to identify malicious behavior, and its behavior for the corresponding processing  ...  , which is used for a security policy violation behavior detection in computer network technology.  ...  Rule based intrusion detection is carried out through the analysis of audit data to find illegal intrusion behavior, this intrusion detection method is tested based on the rules, and these rules and the  ... 
doi:10.12783/dtssehs/ssme2017/13001 fatcat:sihtj6jfkff7jmxzggu2qjcw2i

Comprehensive Review: Intrusion Detection System and Techniques

Sheenam Sheenam, Sanjeev Dhiman
2016 IOSR Journal of Computer Engineering  
Number of methods is used to secure the system; our focus is on the study of intrusion detection System.  ...  Many techniques are used to check the system vulnerabilities and to detect the behavior of the system .i.e. anomalous behavior. Threats on the network become the significant research issue.  ...  From the known attacks, patterns are searched through the incoming data so that the intrusions can be found.  ... 
doi:10.9790/0661-1804032025 fatcat:rn2eewkctfaqdge5tjbf32bvre

A Novel Research on Real-Time Intrusion Detection Technology Based on Data Mining

Kui Yang
2019 Journal of Physics, Conference Series  
Adaptive detection based on data mining is the development trend of intrusion detection system, it can adapt to different network environment, and does not depend on expert training data.  ...  Based on the reference on the basis of predecessors, this paper proposes a real-time intrusion detection system based on data mining framework structure.  ...  Principle of intrusion detection system Intrusion detection, which is found for invading behavior.  ... 
doi:10.1088/1742-6596/1345/5/052016 fatcat:iaeiiyekdjcg5ph2hmlh2jsqfy

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
2007 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07)  
The anomaly detection module processes unlabeled data using a clustering algorithm to detect abnormal behaviors.  ...  In this paper, a behavior analysis-based learning framework for host level network intrusion detection is proposed, consisting of two parts, anomaly detection and alert verification.  ...  Behavior analysis-based learning framework for host-based intrusion detection Behavior analysis-based intrusion detection Anomaly detection can only detect intrusions that make the host behave differently  ... 
doi:10.1109/ecbs.2007.23 dblp:conf/ecbs/QiaoPFR07 fatcat:vvddvlhgtfaxvaefsshs22fdyy

An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment

Bo Hong, Hui Wang, Zijian Cao, Deepak Gupta
2021 Wireless Communications and Mobile Computing  
On the other hand, it can solve the problems of single-point fault-tolerant and the insufficient data processing capacity of the traditional intrusion detection system.  ...  By detecting the CPU and memory usage of hosts, TCP connections, network bandwidth, web server operation logs, and the logs of user behavior, the proposed IDS especially focuses on monitoring the first  ...  In abnormal intrusion detection, all intrusion behaviors are assumed to be different from normal behaviors.  ... 
doi:10.1155/2021/2716881 fatcat:om53susmujeqzppgumtf2ligtu

A Novel Cloud Computing System Intrusion Detection Model Based on Modified Genetic Algorithm

Wen-zhun HUANG, Xin-xin XIE
2016 DEStech Transactions on Environment Energy and Earth Science  
In this paper, we propose novel cloud computing system intrusion detection model based on the modified genetic algorithm.  ...  upgrade feature library to ensure detection rules to prevent a new attack behavior, but for the IDS for a wider range of application, also must improve the test efficiency, reduce false positives and  ...  It is generally through the online or offline analysis system of the audit data, when found that intrusion attempts or intrusion behavior, network administrators can timely report, which enables the administrator  ... 
doi:10.12783/dteees/seeie2016/4557 fatcat:3gidijkj2zhmfeihqmgunrosdi

A Review of Intrusion Detection Technology Based on Deep Rein-forcement Learning

Juquan Yu, Rui Zhou, Ziming Wang, Zixing Wang
2021 Electronics Science Technology and Application  
Through extensive investigation, this paper presents the latest work of network intrusion detection technology based on deep learning.  ...  Firstly, this paper introduces the related concepts of network intrusion detection technology.  ...  The primary task of anomaly intrusion detection is to extract the flow-level behavior characteristics of network traffic from the original network data and analyze them.  ... 
doi:10.18686/esta.v7i4.164 fatcat:qwmndfprk5d5rf6j75mvzfwjve

A New Network Intrusion Detection System based on Blockchain

Fu Jinhua, Xu Mixue, Huang Yongzhong, Tao Hongwei
2019 International Journal of Performability Engineering  
In order to achieve the purpose of intrusion detection and protection, the traditional network intrusion detection system extracts features from the data of the network data stream according to the feature  ...  However, if a user wants to effectively detect malicious behaviors in the network, a large feature library is needed, and it cannot be shared with other users, which makes the quality of single user detection  ...  Anomaly-based network intrusion detection checks intrusion behaviors by defining normal user behaviors and identifying the operations that are inconsistent with normal behaviors.  ... 
doi:10.23940/ijpe.19.12.p10.31873195 fatcat:eeoleslvdjbxpeudr7syfiy54u

Artificial Intelligence Techniques for Network Intrusion Detection

Karan Napanda, Harsh Shah, Lakhsmi Kurup
2015 International Journal of Engineering Research and  
Network Intrusion has become the biggest concern of this generation. A lot of data is stored on commercial and personal computers.  ...  This paper aims to study the different AI techniques that can be used in support of Intrusion (Anomaly and Misuse) Detection Systems to provide better Intrusion Detection & Prevention.  ...  Machine Learning Intrusion Detection has been a major research and concern problem in today's world, considering the amount of confidential data that flows through different connections.  ... 
doi:10.17577/ijertv4is110283 fatcat:kbpxtylihjepxees4c2apmidhy

Study on Application of Honeypot in Campus Net Security

Huang Xin, Si Dong Yu, Rong Ze Wan
2013 Advanced Materials Research  
[8] [9] . (1) Data capture block: Through the intrusion to the detection system, IDS can timely capture communication between invaders and honeypot server, and realizes the real-time network traffic  ...  IDS can capture all of the network flow, and creates log files and database for the invaders, for later analysis and statistics. (2) Data control block: Through the intrusion detection system, IDS can  ... 
doi:10.4028/ fatcat:aufm6v77n5hnpewdks7ch2pjji

An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems

Nong Ye, Qiang Chen
2001 Quality and Reliability Engineering International  
Intrusive events were detected at a very early stage.  ...  An intrusion into an information system compromises its security (e.g. availability, integrity and confidentiality) through a series of events in the information system.  ...  Layers of defense can be set up against intrusions through prevention, detection, reaction and so on.  ... 
doi:10.1002/qre.392 fatcat:ilmtk54ecfatxerehkphye4aem
« Previous Showing results 1 — 15 out of 87,399 results